80 likes | 95 Views
USC CSci599 Trusted Computing - Lecture Fourteen Current Topics 20 April 2007. Dr. Clifford Neuman University of Southern California Information Sciences Institute. Announcements. Additional lecture audio posted (thanks Rob Huber) Next week is final lecture Projects due
E N D
USC CSci599Trusted Computing - Lecture FourteenCurrent Topics20 April 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute
Announcements • Additional lecture audio posted • (thanks Rob Huber) • Next week is final lecture • Projects due • Class Evaluation Next Week
Presentations • Diana Kirtley • Vijay Gopala Krishnan (possibly)
TC and Distributed Firewalls • Product space for firewalls • Traditional firewalls • Host based firewalls • Embedded firewalls • Distributed firewalls • Benefits of each • Limitations of each • How can trusted computing help • What about TVSA
TC and Reputation Based Systems • How TC can help • Limit number of identities • Manage reputation directly • Protect credentials use by participants • What about reputation used for TC • How we determine which programs are trusted.
TC and Performance • Costs of trusted computing lie in: • Measurement during load • Crypto for attestation “Quote” • Managing “what” is allowed • Overhead of virtualization • Human costs of separation
TC and Mobile Devices • Using mobile devices as “trusted path” to user • Attestation enables trusted device to verify integrity of the device that is requesting path to user. • Some of these ideas are being explored by Adrian Perrig at CMU • (work some examples)
TC and Forensics • Chain of custody is important for forensics • A TPM that signs and dates something in such a way that it can not be later modified – even by the person possessing it, can replace traditional chain of custody. • Must argue that the TPM can not be compromised. • A way of linking series of attestations can help.